06 Jan

Internet of Things: Supercharged by 5G Deployment – Part 1

It’s true that inorganic users don’t yell at customer-service reps or trash-talk companies on Twitter. But connected devices can also benefit from some less-obvious upgrades that 5G should deliver.

read more

Share this
23 Dec

Cybersecurity & Data Privacy Trends for 2020

Cybersecurity continues to be the number one “external concern” for American CEOs, regardless of their industry. That’s because the number of cyberattacks is increasing every year – with hackers attempting to break into a computer “every 39 seconds on average.”

read more

Share this
16 Dec

How to Tell If an App Is Malware?

There are a lot of apps you can download on Apple’s App Store and the Google Play Store. That’s obvious. What’s not so obvious is that even though both companies do a pretty good job of (mostly) catching malware apps, there are still plenty that sneak through because they just toe the line between scammy and barely helpful.

read more

Share this
09 Dec

Internet of Things: Security Regulations are Getting Tougher

Whether you’re manufacturing and marketing connected products or selling Internet-of-Things services and solutions, your most significant competitive advantage may be ironclad security.

read more

Share this
02 Dec

Internet of Things in the Fight for Climate Change

The Industrial Revolution and the technology underpinning it has been one of the primary drivers of manmade climate change. Yet it’s another industrial revolution and another set of new technologies that looks set to help humanity avoid the worst effects of anthropogenic global warming.

read more

Share this
25 Nov

5 Ways to Maintain Your ERP’s Data Security

High-profile network breaches in recent years have impacted the discussion of data security significantly. The ability of institutions to safeguard personal information has come into question, even to the point of government entities enacting new legislation that mandates increased effort towards individual data safety. As current data loss prevention methods are reevaluated, so too will the data security of enterprise software systems have to be.

read more

Share this
18 Nov

How Malware Is Using Your PC for Cyber Attacks

It’s not just botnets that can hijack PCs for nefarious ends. Microsoft and Cisco’s Talos researchers have identified a new malware strain, Nodersok (or Divergent), that uses web apps to turn systems into proxies for malicious internet traffic.

read more

Share this
11 Nov
04 Nov

Protect Yourself from Cyber Threats During Holidays

The holiday season often leads to an increased risk of cybersecurity threats. You may notice an increase in offers coming to you via email, or online ads with attractive promotions for gifts, travel, etc. Unfortunately, some of these offers don’t turn out exactly what you ordered and paid for, so instead of saving money, you can be fooled and get into a situation of data theft, identity, or personal items. Therefore, when it comes to online security, here are the things you can do to protect yourself during the holiday season.

read more

Share this
28 Oct

How Speakers Can Be Used as Cyber Weapons

Speakers are everywhere, whether it’s expensive, standalone sound systems, laptops, smart home devices, or cheap portables. And while you rely on them for music or conversation, researchers have long known that commercial speakers are also physically able to emit frequencies outside of the audible range for humans. At the Defcon security conference in Las Vegas held recently, one researcher is warning that this capability has the potential to be weaponized.

read more

Share this

© 2017 Awontis. All rights reserved.